008 |
|
180622s2017 cc a 001 0 eng d |
020 |
|
|a9781491934944 (pbk.) :|cUS59.99
|
020 |
|
|a1491934948 (pbk.)
|
040 |
|
|aBTCTA|beng|cBTCTA|dYDXCP|dBDX|dUOK|dVGM|dEQO|dOCLCA|dIBI|dU3G|dNOU
|
050 |
4
|
|aHV6773|b.R635 2017
|
082 |
04
|
|a364.16/8|223
|
095 |
|
|aLB|bLBF|cE019131|dHV6773|eR647|y2017|ffish|pBook
|
100 |
1
|
|aRoberts, Scott J.|c(Writer on computer security),|eauthor.
|
245 |
10
|
|aIntelligence-driven incident response :|boutwitting the adversary /|cScott J. Roberts and Rebekah Brown.
|
250 |
|
|a1st ed.
|
260 |
|
|aBeijing ;|aCambridge ;|aFarnham ;|aKöln ;|aSebastopol ;|aTokyo :|bO'Reilly,|c2017.
|
300 |
|
|axvii, 260 p. :|bill. ;|c24 cm.
|
500 |
|
|aIncludes index.
|
650 |
0
|
|aComputer crimes|xInvestigation.
|
650 |
0
|
|aComputer security.
|
650 |
0
|
|aCyberspace|xSecurity measures.
|
650 |
0
|
|aBusiness intelligence|xManagement.
|
650 |
0
|
|aComputer networks|xSecurity measures.
|
650 |
0
|
|aData recovery (Computer science)
|
700 |
1
|
|aBrown, Rebekah|c(Writer on computer security),|eauthor.
|